JOURNAL ARTICLE

Security In Wireless Sensor Networks Using Key Management Schemes

P SoundaryaL. M. Varalakshmi

Year: 2010 Journal:   International Journal of Computer Science and Information Technology Vol: 2 (6)Pages: 76-90

Abstract

Wireless sensor networks pose new security and privacy challenges.One of the important challenges is how to bootstrap secure communications among nodes.Several key management schemes have been proposed.Key management plays an essential role in achieving security in wireless sensor networks (WSN).Due to resource constraints, achieving such key agreement in wireless sensor networks is nontrivial.Many key agreement schemes used in general networks, such as Diffie-Hellman and publickey based schemes, are not suitable for wireless sensor networks.Pre-distribution of secret keys for all pairs of nodes is not viable due to the large amount of memory used when the network size is large.In this paper, a new key pre-distribution scheme is proposed (DDHV SCHEME), which substantially improves the resilience of the network compared to the existing schemes (EG SCHEME).Our scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that any node other than these compromised nodes is affected is close to zero.This desirable property lowers the initial payoff of smaller scale network breaches to an adversary, and makes it necessary for the adversary to attack a significant proportion of the network.

Keywords:
Computer science Key management Key (lock) Wireless sensor network Computer security Computer network Wireless Telecommunications Cryptography

Metrics

2
Cited By
0.37
FWCI (Field Weighted Citation Impact)
11
Refs
0.69
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security in Wireless Sensor Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications
Mobile Ad Hoc Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

BOOK-CHAPTER

Collaborative Security Schemes for Wireless Sensor Networks

Mohammad SirajuddinB. Sateesh Kumar

Lecture notes in electrical engineering Year: 2022 Pages: 343-354
JOURNAL ARTICLE

Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes

Ulya SabeelSaima Maqbool

Journal:   International Journal of Computer Applications Year: 2013 Vol: 64 (16)Pages: 19-28
BOOK-CHAPTER

Key Management Schemes for Wireless Sensor Networks

Chuang Lin Yixin Jiang

Auerbach Publications eBooks Year: 2016 Pages: 129-160
JOURNAL ARTICLE

Wireless Sensor Networks (WSNs): Key Management Schemes

Jamil IbriqImad MahgoubMohammad IlyasMihaela Cardei

Journal:   Encyclopedia of Wireless and Mobile Communications Year: 2008 Pages: 2307-2320
BOOK-CHAPTER

Key Management Schemes for Wireless Sensor Networks

Yixin JiangChuang LinMinghui ShiXuemin Shen

Auerbach Publications eBooks Year: 2006 Pages: 113-143
© 2026 ScienceGate Book Chapters — All rights reserved.